Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Black Hat via YouTube Direct link

UEFI Variables (Keys and Key Stores) 2

17 of 19

17 of 19

UEFI Variables (Keys and Key Stores) 2

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Analyzing UEFI BIOSes from Attacker & Defender Viewpoints

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction 2
  2. 2 BIOS is dead, long live UEFI!
  3. 3 About UEFI
  4. 4 UEFI Differences: Boot Phases
  5. 5 Legacy BIOS Firmware Storage
  6. 6 Firmware Files
  7. 7 Yay Standardization!
  8. 8 Security (SEC) Phase
  9. 9 SEC Responsibilities 1 of 2
  10. 10 Quick ACPI Note: Sleep Modes
  11. 11 SEC Responsibilities 2 of 2
  12. 12 SEC Hand-off to PEI Entry Point
  13. 13 Components of PEI
  14. 14 UEFI Non-Volatile Variables
  15. 15 EFI Variable Attributes Combinations
  16. 16 Authenticate how Keys and Key Stores
  17. 17 UEFI Variables (Keys and Key Stores) 2
  18. 18 Boot Device Selection (BDS)
  19. 19 Transient System Load (TSL)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.